Overview

Description

JAMF Software's Casper Suite, a Mac OS X and iOS client management framework, contains a cross-site request forgery (CSRF) (CWE-352) vulnerability. The reporter provided a proof-of-concept that created a new user and modified the password for an existing user.

Impact

By convincing the user to follow a specifically crafted URL, an attacker may be able to execute commands in the context of the logged in user.

Solution

Apply an Update

Casper Suite 8.61 has been released to address this vulnerability. Users should contact JAMF Software to obtain this version.

If you cannot update for whatever reason, please consider the following workarounds.

Do not click on links

Do not follow links from emails or instant messages. Always access the management interface by typing in the web address or using a known good bookmark.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent CSRF attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the site using stolen credentials from a blocked network location.